ns_name           101 security/apparmor/domain.c 	const char *ns_name;
ns_name           109 security/apparmor/domain.c 	ns_name = aa_ns_name(profile->ns, tp->ns, true);
ns_name           111 security/apparmor/domain.c 	state = aa_dfa_match(profile->file.dfa, state, ns_name);
ns_name            50 security/apparmor/include/lib.h char *aa_split_fqname(char *args, char **ns_name);
ns_name            51 security/apparmor/include/lib.h const char *aa_splitn_fqname(const char *fqname, size_t n, const char **ns_name,
ns_name            24 security/apparmor/include/policy_unpack.h 	const char *ns_name;
ns_name          1245 security/apparmor/label.c 	const char *ns_name;
ns_name          1251 security/apparmor/label.c 	ns_name = aa_ns_name(profile->ns, tp->ns, true);
ns_name          1253 security/apparmor/label.c 	state = aa_dfa_match(profile->policy.dfa, state, ns_name);
ns_name          1488 security/apparmor/label.c 	const char *ns_name = NULL;
ns_name          1500 security/apparmor/label.c 		ns_name = aa_ns_name(view, profile->ns,
ns_name          1502 security/apparmor/label.c 		if (ns_name == aa_hidden_ns_name) {
ns_name          1505 security/apparmor/label.c 			return snprintf(str, size, "%s", ns_name);
ns_name          1512 security/apparmor/label.c 		if (ns_name)
ns_name          1513 security/apparmor/label.c 			return snprintf(str, size, ":%s:%s (%s)", ns_name,
ns_name          1519 security/apparmor/label.c 	if (ns_name)
ns_name          1520 security/apparmor/label.c 		return snprintf(str, size, ":%s:%s", ns_name,
ns_name            42 security/apparmor/lib.c char *aa_split_fqname(char *fqname, char **ns_name)
ns_name            46 security/apparmor/lib.c 	*ns_name = NULL;
ns_name            49 security/apparmor/lib.c 		*ns_name = skip_spaces(&name[1]);
ns_name            83 security/apparmor/lib.c const char *aa_splitn_fqname(const char *fqname, size_t n, const char **ns_name,
ns_name            89 security/apparmor/lib.c 	*ns_name = NULL;
ns_name            97 security/apparmor/lib.c 		*ns_name = skipn_spaces(&name[1], end - &name[1]);
ns_name            98 security/apparmor/lib.c 		if (!*ns_name)
ns_name           101 security/apparmor/lib.c 			*ns_len = split - *ns_name;
ns_name           103 security/apparmor/lib.c 				*ns_name = NULL;
ns_name           111 security/apparmor/lib.c 			*ns_len = end - *ns_name;
ns_name           461 security/apparmor/policy.c 	const char *name, *ns_name;
ns_name           464 security/apparmor/policy.c 	name = aa_splitn_fqname(fqname, n, &ns_name, &ns_len);
ns_name           465 security/apparmor/policy.c 	if (ns_name) {
ns_name           466 security/apparmor/policy.c 		ns = aa_lookupn_ns(labels_ns(base), ns_name, ns_len);
ns_name           618 security/apparmor/policy.c 			const char *ns_name, const char *name,
ns_name           623 security/apparmor/policy.c 	aad(&sa)->iface.ns = ns_name;
ns_name           859 security/apparmor/policy.c 	const char *ns_name, *info = NULL;
ns_name           870 security/apparmor/policy.c 	error = aa_unpack(udata, &lh, &ns_name);
ns_name           881 security/apparmor/policy.c 		if (ns_name) {
ns_name           882 security/apparmor/policy.c 			if (ent->ns_name &&
ns_name           883 security/apparmor/policy.c 			    strcmp(ent->ns_name, ns_name) != 0) {
ns_name           888 security/apparmor/policy.c 		} else if (ent->ns_name) {
ns_name           894 security/apparmor/policy.c 			ns_name = ent->ns_name;
ns_name           898 security/apparmor/policy.c 	if (ns_name) {
ns_name           900 security/apparmor/policy.c 				   ns_name);
ns_name          1006 security/apparmor/policy.c 			audit_policy(label, op, ns_name, ent->new->base.hname,
ns_name          1019 security/apparmor/policy.c 		audit_policy(label, op, ns_name, ent->new->base.hname, NULL,
ns_name          1057 security/apparmor/policy.c 	  audit_policy(label, op, ns_name, ent ? ent->new->base.hname : NULL,
ns_name          1068 security/apparmor/policy.c 		audit_policy(label, op, ns_name, tmp->new->base.hname, info,
ns_name          1099 security/apparmor/policy.c 	const char *ns_name = NULL;
ns_name          1111 security/apparmor/policy.c 		name = aa_splitn_fqname(fqname, size, &ns_name, &ns_len);
ns_name          1114 security/apparmor/policy.c 				   ns_name, ns_len);
ns_name          1147 security/apparmor/policy.c 	(void) audit_policy(subj, OP_PROF_RM, ns_name, name, info,
ns_name          1158 security/apparmor/policy.c 	(void) audit_policy(subj, OP_PROF_RM, ns_name, name, info,
ns_name           104 security/apparmor/policy_unpack.c static int audit_iface(struct aa_profile *new, const char *ns_name,
ns_name           112 security/apparmor/policy_unpack.c 	aad(&sa)->iface.ns = ns_name;
ns_name           671 security/apparmor/policy_unpack.c static struct aa_profile *unpack_profile(struct aa_ext *e, char **ns_name)
ns_name           684 security/apparmor/policy_unpack.c 	*ns_name = NULL;
ns_name           696 security/apparmor/policy_unpack.c 		*ns_name = kstrndup(tmpns, ns_len, GFP_KERNEL);
ns_name           697 security/apparmor/policy_unpack.c 		if (!*ns_name) {
ns_name          1029 security/apparmor/policy_unpack.c 		kfree(ent->ns_name);
ns_name          1068 security/apparmor/policy_unpack.c 		char *ns_name = NULL;
ns_name          1075 security/apparmor/policy_unpack.c 		profile = unpack_profile(&e, &ns_name);
ns_name          1098 security/apparmor/policy_unpack.c 		ent->ns_name = ns_name;